Category: vulnerability

SIM-based attack has been used to spy on people for two years

[ad_1] Crucially, the approach is silent. While it does use SMS, you won’t get notifications. An intruder can obtain frequent updates without giving away their activity. The exploit is also device-agnostic, and has been used against iPhones, numerous brands of Android phones and some SIM-equipped Internet of Things devices. And it’s not just a theoretical […]

Apple tries to clear up Google’s claims about iOS vulnerabilities

[ad_1] Apple reiterates that the vulnerabilities Google highlighted were fixed in February. It says the attack affected fewer than a dozen websites that were targeted at the Uighur community. Apple believes the website attacks were only operational for about two months, not two years, as the Google security researchers wrote. Apple reportedly fixed the issue […]

Sites stealing iPhone data reportedly targeted Uyghur Muslims

[ad_1] It’s not certain if the sites also targeted Android users, although Forbes sources said Android and Windows users were also under the crosshairs. China has used a number of tactics to compromise phones and crack down on Uyghur Muslims. Border guards have reportedly been installing surveillance apps on the Android phones of tourists entering […]

Researchers found another way to potentially clone Model S key fobs

[ad_1] Apparently, the vulnerability allows hackers to break the 80-bit encryption by cracking two 40-bit keys instead. The new attack has a shorter range than the first, and it takes a bit longer than a couple of seconds, but it’s still doable. Model S owners don’t have to worry about bad actors using the flaw […]

Apple re-fixes a bug that let users jailbreak iPhones

[ad_1] This current update fixes a kernel vulnerability that would have allowed an attacker to “execute arbitrary code with system privileges” on an iPhone or iPad. Apple also mentioned Pwn20wnd, the hacker that released the public jailbreak. “We would like to acknowledge @Pwn20wnd for their assistance,” the company wrote in a security update. As you […]

Even DSLR cameras are vulnerable to ransomware

[ad_1] Check Point Software noticed that the Picture Transfer Protocol (PTP) — which is unauthenticated in both wired and wireless modes — is particularly vulnerable to malware attacks. Ironically, they were able to uncover flaws in the Canon EOS 80D by using firmware originally cracked by Magic Lantern, which supplies its own open source app […]

Google researchers discovered serious iOS security flaws

[ad_1] The majority of the vulnerabilities discovered by google were so-called “interactionless” bugs, meaning they can be executed on a remote iOS device without requiring any sort of direct interaction with the phone. An attacker simply has to send malicious code via iMessage and wait for the victim to open it. Because these “interactionless” bugs […]

A Bluetooth vulnerability could give hackers your location

[ad_1] The vulnerability has to do with the way Bluetooth-enabled devices pair with each other. In that relationship, one device serves as the central connection and the other plays a peripheral role. The peripheral device sends out a signal that contains a unique address — similar to an IP address — and data about the […]

Apple disables its walkie-talkie Watch app due to vulnerability

[ad_1] We were just made aware of a vulnerability related to the Walkie-Talkie app on the Apple Watch and have disabled the function as we quickly fix the issue. We apologize to our customers for the inconvenience and will restore the functionality as soon as possible. Although we are not aware of any use of […]

Apple quietly updates Macs to remove Zoom webcam exploit

[ad_1] Zoom told TechCrunch that it partnered with Apple to test the fix. It shouldn’t affect functionality other than requiring your permission to launch the app. We’ve asked Apple for comment. Apple is known to deliver quiet updates to block malware. This, however, is another story — the company is pushing an update to fix […]